Exploitation Tools

CVE-2024-38473 Nuclei Template : Mastering Apache ACL Bypass Techniques

Nuclei template designed to detect Apache servers vulnerable to CVE-2024-38473. It first identifies servers running Apache < 2.4.60 with default PHP-FPM…

5 months ago

EmuScan – Advanced Emulation Detection For Firmware And Devices

This test is based on ekknod's [drvscan], with added emulation detection for common devices. Thanks to ekknod for his contribution.Thanks…

5 months ago

Graphpython – A Comprehensive Tool For Microsoft Graph API Enumeration And Exploitation

Graphpython is a modular Python tool for cross-platform Microsoft Graph API enumeration and exploitation. It builds upon the capabilities of…

5 months ago

RS-Shellcode : A Comprehensive Guide To Shellcode Execution With Rust

Dive into the world of cybersecurity with "RS-Shellcode," a robust shellcode runner crafted in Rust. This tool leverages the windows-rs…

5 months ago

Collateral Damage – Unveiling The Xbox Kernel Exploit

Collateral Damage is a kernel exploit for Xbox SystemOS using CVE-2024-30088. It targets Xbox One and Xbox Series consoles running kernel…

5 months ago

MagiskEoP – Unpacking The Silent Root Exploit In Magisk

This is an exploit for a vulnerability in Magisk app that allows a local app to silently gain root access…

5 months ago

Windows Downdate – Mastering The Art Of OS Downgrade Attacks

A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities. Presented at Black Hat…

5 months ago

3proxy – Features, Installation, And Usage Guide

The versatile capabilities of 3proxy, a robust and lightweight proxy server designed for a variety of network tasks. From basic…

5 months ago

JYso – A Comprehensive Guide To Advanced JNDI And Serialization Exploits

JYso is a tool that can be used as both ysoserial and JNDIExploit. It also has bypass functions of multiple JNDI…

5 months ago

Findsploit – The Ultimate Tool For Exploit Discovery And Management

Finsploit is a simple bash script to quickly and easily search both local and online exploit databases. This repository also…

5 months ago